bluehat 2018 Jan. 23, 2018 to Jan. 24, 2018, sheva,tel aviv

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Fake News and Info-Ops: Modern Information Warfare,and What to Do About It Matt Tait In the Summer of 2016, the U.S. was rocked by a huge disinformation campaign orchestrated ...
Active Directory: What Can Make Your Million Dollar SIEM Go Blind? Benjamin Delpy , Vincent Le Toux Active Directory is a key element for security and is a primary target in most ...
Attribution 2.0: When Code Reuse Brings Down the House of Cards Costin Raiu In June 2016, Motherboard’s Lorenzo Franceschi-Bicchierai interviewed the alleged DNC (hacker Guccifer 2.0. When asked ...
Born Secure. How to Design a Brand New Cloud Platform with a Strong Security posture Lee Holmes What if you could design a sealed, cloud infrastructure starting from a clean slate? What ...
Browser Security Beyond Sandboxing Jordan Rabet Security is now a strong differentiator in picking the right browser - a single compromise ...
Computers Gone Rogue: Abusing Computer Accounts to Gain Control in an Active Directory Environment Itai Grady , Marina Simakov Active Directory has always been a lucrative target for attackers since it serves as the ...
eMMC Hacking, Or: How I Fixed Long-Dead Galaxy S3 Phones Oran Avraham A few years ago Samsung Galaxy S3 devices started dying all around the world (a ...
Ethereum VM, Bytecode & Bugged Smart-Contracts Matt Suiche In this talk we will explore the Ethereum Virtual Machine (EVM) architecture, explore its smart-contract ...
Extracting Secrets from Silicon – A New Generation of Bug Hunting Gunter Ollmann As reverse engineering tools and hacking techniques have improved over the years, software engineers have ...
Hi, My Name is "CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" Matt Graeber In the context of computer security, what is trust and what does it mean to ...
KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef This talk presents the key reinstallation attack. It abuses design or implementation flaws in cryptographic ...
Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL Saar Amar WSL (Windows Subsystem for Linux) is an impressive mechanism integrated recently into the Windows 10 ...
New and Improved UMCI, Same Old Bugs James Forshaw User Mode Code Integrity (UMCI) restricts what executables can be run based on the signer. ...
Terrorist Phone Unlocking 101 Shahar Tal , Gil Kaminker The widely misreported realm of mobile phone unlocking and forensic extraction has significantly developed in ...
The New Paradigm of Security Controls John Lambert We are seeing a new approach to security that is rippling across network defenders, products, ...
The Wolf in SGX Clothing Marion Marschalek SGX is a security technology, which is designed to hide secrets from the very platform ...
Windows: Hardening with Hardware David Weston The security features of modern PC hardware are enabling new trust boundaries and attack resistance ...